Difference between revisions of "Los Angeles Presentation Archive"

From OWASP
Jump to: navigation, search
(Created page with "This page contains slides from OWASP Los Angeles Chapter Meetings: ==2011== * December * November * October * September * August * July * June * May * April * March * February ...")
 
Line 34: Line 34:
  
 
==2009==
 
==2009==
*December - Michael Sutton: [[Media:Sutton_-_Pulling_The_Plug-Security_Risks_in_Next_Generation_Offline_Web_Apps_-_OWASP_LA_OC.pdf|Pulling the Plug PDF]]
+
*December - Michael Sutton: [[Media:Sutton_-_Pulling_The_Plug-Security_Risks_in_Next_Generation_Offline_Web_Apps_-_OWASP_LA_OC.pdf|Pulling the Plug: Security Risks in the Next Generation of Offline Web Applications PDF]]
 
*November - Brian Chess: [[Media:Watching_software_run_11.18.09.pptx| Watching Software Run pptx]]
 
*November - Brian Chess: [[Media:Watching_software_run_11.18.09.pptx| Watching Software Run pptx]]
* October - Shankar Subramaniyan: [[Media:ISO27001_OWASPLA_Shankar_10212009.pdf|Enabling Compliance Requirements PDF]]
+
* October - Shankar Subramaniyan: [[Media:ISO27001_OWASPLA_Shankar_10212009.pdf|Enabling Compliance Requirements using Information Security Management System (ISMS) Framework (ISO27001) PDF]]
* September - Matt Tesauro
+
* September - Marco Morana and Tony UcedaVelez: The Rise of Threat Analysis and the Fall of Compliance, Policies, and Standards in mitigating Web Application Security Risks
* August - Pravir Chandra
+
* August - Matt Tesauro: OWASP Live CD Demo and Q&A
* July - David Bryan
+
* August - Pravir Chandra: The Software Assurance Maturity Model (SAMM)
* June - Mikhael Felker
+
* July - David Bryan: Lock picks, BumpKeys, and Hackers oh my! How secure is your application?
 +
* June - Mikhael Felker: Information Warfare: Past, Present and Future
 
* May - Jeremiah Grossman: [http://video.google.com/videoplay?docid=2875886330538461390 Top Ten Web Hacking Techniques of 2008]
 
* May - Jeremiah Grossman: [http://video.google.com/videoplay?docid=2875886330538461390 Top Ten Web Hacking Techniques of 2008]
 
* April - David Campbell: [[Media:DC_ED_OWASP_XSS_MAY2008_v1.0.pdf| XSS, Exploits and Defenses PDF]]
 
* April - David Campbell: [[Media:DC_ED_OWASP_XSS_MAY2008_v1.0.pdf| XSS, Exploits and Defenses PDF]]
 
* March -  NETWORK SECURITY DINNER WITH ISSA - CISO'S Security Dashboard Panel
 
* March -  NETWORK SECURITY DINNER WITH ISSA - CISO'S Security Dashboard Panel
 
* February - Alex Stamos:  [[Media:Cloud_Computing_Security.pdf| Cloud Computing and Security PDF]]
 
* February - Alex Stamos:  [[Media:Cloud_Computing_Security.pdf| Cloud Computing and Security PDF]]
* January -  Ben Walther
+
* January -  Ben Walther: Building Security into the Test Organization
 +
 
 +
==2008==
 +
 
 +
* December - Samy Kamkar: [[Media:OWASP-WASCAppSec2007SanJose_SamyWorm.ppt| The MySpace Worm ppt]]
 +
* November - Stephan Chenette: A new web attack vector: Script Fragmentation
 +
* October - Jonathan Gershater: Entitlements Management: Security and policies for SOA using XML appliances
 +
* September -  Ryan C. Barnett:  The Web Hacking Incident Database (WHID) 2007 Report
 +
* August -  Jeff Williams: Don't Write Your Own Security Code

Revision as of 00:08, 12 July 2011

This page contains slides from OWASP Los Angeles Chapter Meetings:

2011

  • December
  • November
  • October
  • September
  • August
  • July
  • June
  • May
  • April
  • March
  • February
  • January


2010

  • December
  • November
  • October
  • September
  • August
  • July
  • June
  • May
  • April
  • March
  • February
  • January


2009

2008

  • December - Samy Kamkar: The MySpace Worm ppt
  • November - Stephan Chenette: A new web attack vector: Script Fragmentation
  • October - Jonathan Gershater: Entitlements Management: Security and policies for SOA using XML appliances
  • September - Ryan C. Barnett: The Web Hacking Incident Database (WHID) 2007 Report
  • August - Jeff Williams: Don't Write Your Own Security Code